Afternoon Review in IT Security — May 23, 2026
The cybersecurity landscape continues to face mounting pressure from multiple fronts on May 23, 2026. Critical vulnerabilities in widely deployed hardware, zero-day exploits affecting major operating systems, supply chain compromises targeting development tools, and the emerging impact of artificial intelligence on open source ecosystems all demand immediate attention from security professionals and organizations worldwide.
RondoDox Botnet Exploits Critical 2018 Vulnerability to Hijack ASUS Routers
Cybersecurity researchers at VulnCheck have uncovered an active exploitation campaign leveraging a critical 2018 vulnerability to compromise over a million ASUS routers globally. The RondoDox botnet is actively exploiting CVE-2018-5999 to bypass authentication mechanisms and gain unauthorized access to vulnerable devices. The campaign demonstrates how legacy vulnerabilities continue to pose significant threats when patches remain undeployed across large installed bases. Source: Hackread
This incident underscores the persistent risk posed by unpatched network infrastructure. Organizations and individual users operating ASUS routers should prioritize immediate firmware updates to remediate the identified vulnerability and prevent botnet infection.
Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days
Microsoft has released security patches addressing two actively exploited zero-day vulnerabilities affecting its Defender security products. The vulnerabilities, identified as CVE-2026-41091 and CVE-2026-45498, could allow attackers to escalate privileges to System level or create denial-of-service conditions on compromised systems. The BlueHammer malware has been observed exploiting these flaws in the wild. Source: SecurityWeek
The exploitation of security software itself represents a critical threat vector, as it undermines the defensive infrastructure organizations depend upon. Immediate patching of all Defender installations is essential to prevent privilege escalation and system compromise.
GitHub Links Repository Breach to TanStack npm Supply-Chain Attack
GitHub has confirmed that the breach of 3,800 internal repositories was facilitated through a malicious version of the Nx Console VS Code extension, which was compromised during last week's TanStack npm supply-chain attack. The attack chain demonstrates how vulnerabilities in development tools can cascade through the supply chain to compromise major technology platforms. Source: BleepingComputer
This incident highlights the critical importance of vetting third-party development extensions and maintaining rigorous monitoring of supply chain dependencies. Organizations should conduct comprehensive audits of their development tool ecosystems to identify and remediate similar compromises.
AI Has Taken Over Open Source
Analysis of open source package ecosystems reveals that artificial intelligence has fundamentally transformed the production and consumption of software dependencies. Data from Socket's comprehensive package database shows an unprecedented surge in npm package creation beginning in January 2026, with AI-generated packages now accounting for over 30 percent of new submissions based on stylistic markers. This exponential growth has been accompanied by significant changes in maintainer-contributor dynamics, with open source maintainers increasingly reporting negative experiences with low-quality automated pull requests. Source: Socket
The shift toward AI-driven package creation and dependency selection has created a largely opaque software supply chain where human review is no longer feasible at scale. While AI-generated code often meets functional requirements and selected dependencies frequently outperform human choices, the automated nature of these decisions has created new security risks. The software supply chain has effectively become a black box, necessitating a fundamental shift toward automated analysis and behavioral monitoring of third-party code as the primary defense mechanism against supply chain attacks.
As artificial intelligence continues to reshape open source development practices, security teams must adapt their strategies to accommodate automated package generation, selection, and installation at unprecedented scale. Manual review processes are no longer viable, making automated scanning and risk assessment tools essential components of any production security posture.